Data breach notification

The Notifiable Data Breach scheme seemed so simple back when I started this Master’s degree. Now we are exploring its intricacies in my Cyber and the Law course. Let’s look at a a scenario and how the law applies to a breach. Scenario A large national accounting/tax firm, which handles the personal tax returns of […]
Financial inclusion, digital ID and cyberwar

In this final assessment I looked the current and emerging cyber security vulnerabilities of financial inclusion. In answering this question I looked at what financial inclusion and digital identity are, and how are they correlated. I then described three significant cyber threats posed by financial inclusion projects and how they can be controlled by applying the ACSC […]
Apple vs FBI

This was my final assessment for the cyber ethics course, it was a great topic that brought together the ethical theories with a real world example. I’m now a third of the way through my master’s and qualify for the graduate certificate of cybersecurity, I’ll just be continuing the degree though. Question Do you think […]
Will privacy exist in 2040?

One of the the things that we need to consider when making ethical decisions is the impact the decision will have, not just now and in the foreseeable future, but in the distant future. We need to think about this because we are making decisions that will affect people who have no say in it, […]
The Equifax breach

Equifax is one of the world’s largest credit reporting agencies (CRA), creating credit reports from consumer data which is sold to third parties. Being high value cyber targets, CRAs are subject to high data security requirements imposed by various bodies (U.S. Senate. COMMITTEE ON BANKING, HOUSING, AND URBAN AFFAIRS, 2017). Security challenges were created during […]
Quantum computing

Quantum computers have potential for great advances in our understanding of the world, and it may be happening sooner than we think with recent advances from UNSW in discovering how to control millions of qubits simultaneously (UNSW, 2021). Some of the advances that are predicted to come from quantum computing include: chemical and biological engineering; […]
Privacy

Looking in more detail at privacy this week. I encountered privacy in my first course, Foundations of Cyber Security. It had a profound impact on me: changing the way I manage passwords; locking down my social media accounts; changing the way I pay for goods and OPSEC in my day to day life. Now we […]
CIA’s peddle power

I’ve had a couple of opportunities to apply what I have learnt in the real world this week. Estimating Attacker Power This degree has affected my tv habits, seeing me gravitate towards security and detective related genres, which I do enjoy, I’m just making time to watch them. So this week I started watching the […]
WA Police loopholing check in data

While learning about patterns in security, a recent news story came to mind when scope creep was mentioned -specifically systems and data being created or approved for one use, but inevitably being used for another. The case that came to mind was the WA Police using covid QR check in data in criminal investigations. The […]
Why you should lockdown Facebook

I decided to look at the data Facebook holds about me. I was surprised how easy it was to get my information from Facebook and also how easy it is to protect my data. Given the value of the data I suppose they rely on user ignorance/apathy to leave their settings fairly standard. You can […]